Wireless Network are the most easy as well as desirable target for wannabe hackers. Ever wondered that someone might be leeching of your hard paid wifi network? You may opt out for an expensive way to keep the hackers away by buying hacker-proof wallpapers for your home but that really is far fetched. An easy and free way is to scan your network for the device connected with it. This way you can find out if some unknown or unwanted device is connected to it.
We will use terminal for finding out what devices are connected to your network in Linux. The process is very simple and easy to use even for beginners. Here we go:
Get nmap:
nmap is one of the most popular network scanning tool in Linux. Use the following command to install nmap in Ubuntu:
sudo apt-get install nmap
Get IP range of the network:
Now we need to know the IP address range of the network. Use the ifconfig command to find it out. Look for wlan0 if you are using wifi or eth0 if you are using Ethernet.
user@user-notebook:~$ ifconfig
wlan0 Link encap:Ethernet HWaddr 70:f1:a1:c2:f2:e9
inet addr:192.168.1.91 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::73f1:a1ef:fec2:f2e8/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:2135051 errors:0 dropped:0 overruns:0 frame:0
TX packets:2013773 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1434994913 (1.4 GB) TX bytes:636207445 (636.2 MB)
The important things are highlighted in bold. As you see my IP is 192.168.1.91 and the subnet mask is 255.255.255.0 which means that the ip address range on my network varies from 192.168.1.0 to 192.168.1.255.
Scan the network:
It is advisable to use root privileges while scanning the network for more accurate information. Use the nmap command in following way:
user@user-notebook:~$ sudo nmap -sP 192.168.1.0/24
Starting Nmap 5.21 ( http://nmap.org ) at 2012-09-01 21:59 CESTNmap scan report for neufbox (192.168.1.1)
Host is up (0.012s latency).
MAC Address: E0:A1:D5:72:5A:5C (Unknown)
Nmap scan report for takshak-bambi (192.168.1.91)
Host is up.
Nmap scan report for android-95b23f67te05e1c8 (192.168.1.93)
Host is up (0.36s latency).
As you can see there three devices connected to my network. The router itself, my laptop and my Galaxy S2. What is connected to your network?
from:http://itsfoss.com/how-to-find-what-devices-are-connected-to-network-in-ubuntu/
相关推荐
How to find more accurate structural holes has become a key problem in the research. In this paper, we proposed a method to detect the top-k structure holes based on the shortest path increment. It ...
How-Smart-Connected-Products-Are-Transforming-Competition
network and displays the list of all computers and devices that are currently connected to your network. For every computer or device that is connected to your network, the following information is ...
A vehicle that uses an external network, in addition to the in-vehicle network, is called connected vehicle. A connected vehicle could benefit from smart mobility applications: applications that use ...
USBDeview also allows you to uninstall USB devices that you previously used, and disconnect USB devices that are currently connected to your computer. You can also use USBDeview on a remote computer,...
Fast IP scanner that detects unknown devices connected to your WiFi network. Detects hostnames, determines the MAC address, and in some cases can auto-detect device type (phone, laptop, router, etc). ...
Chapter 15 discusses how to find a device’s loca‐ tion, how to get map data from Google and OpenStreetMap, and how applications can be location-aware in ways that are just now being explored. ...
You’ll learn C and how to code several types of firmware for your Arduino, and then move on to design small typical systems to understand how handling buttons, leds, LCD, network modules and much ...
Whatever version of Windows you are using, you will need a stable Internet connection and access to your company network and its shared files and resources. When a network connection fails, it can ...
IPsec are not enough alone to operate a network that needs to generate services and revenues or to protect its constituency. Access to the network needs to be controlled. Users and devices need to be ...
acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the ...
the IoT to soar to tens of billions of devices by 2020, no one knows how many or what new types of intelligent devices will emerge. Whether these definitions and forecasts are accurate is really not ...
You may have heard of “connected devices” or “Internet-ready” or even “cloud-enabled.” All of these refer to the same thing — be it a single device such as a toaster or a plant monitor or a ...
This book is for developers who are interested in learning what resources are available as part of the Windows Embedded CE tool chains and how to use them. A basic understanding of Visual C++, C#, or ...
What can be concluded about how packets are forwarded in this network? (Choose two.) 19、What header address information does a router change in the information it receives from an attached Ethernet...
if you are connected to a regional network (which is gatewayed to the NSFnet, which is connected to the ARPAnet...) and have a problem, you should contact your regional network operations center.
You’ll learn how graph analytics are uniquely suited to unfold complex structures and reveal difficult-to-find patterns lurking in your data. Whether you are trying to build dynamic network models ...
delivering diagnostics services to the connected car in future connected repair shops. The repair shop will mainly provide two services; vehicle diagnostics and software download. We analyse the ...
Chapter 10 BGP and MPLS in an OSPF Network 655 Part IV Additional OSPF Resources 707 Appendix A OSPF RFCs 705 Index 724 0323FMf.book Page vi Wednesday, March 12, 2003 9:41 AM vii Contents Introduction...
23. The five layers in the Internet protocol stack are – from top to bottom – the application layer, the transport layer, the network layer, the link layer, and the physical layer. The principal ...